default search action
Yuichi Futa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Takehiko Mieno, Hiroyuki Okazaki, Kenichi Arai, Yuichi Futa:
How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif. IEEE Access 12: 31605-31625 (2024) - 2022
- [j29]Kazuhisa Nakasho, Yuichi Futa:
Isomorphism between Spaces of Multilinear Maps and Nested Compositions over Real Normed Vector Spaces. Formaliz. Math. 30(1): 67-77 (2022) - 2021
- [j28]Kazuhisa Nakasho, Yuichi Futa:
Inverse Function Theorem. Part I1. Formaliz. Math. 29(1): 9-19 (2021) - [c6]Ryo Tokuyama, Yuichi Futa, Hikofumi Suzuki, Hiroyuki Okazaki:
Virtual Environment for Analysis and Evaluation of DDoS Attacks. AINA (3) 2021: 459-468 - 2020
- [c5]Takehiko Mieno, Togo Yoshimura, Hiroyuki Okazaki, Yuichi Futa, Kenichi Arai:
Formal Verification of Merkle-Damgård Construction in ProVerif. ISITA 2020: 602-606
2010 – 2019
- 2019
- [j27]Hiroyuki Okazaki, Koh-ichi Nagao, Yuichi Futa:
Maximum Number of Steps Taken by Modular Exponentiation and Euclidean Algorithm. Formaliz. Math. 27(1): 87-91 (2019) - [j26]Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama:
Operations of Points on Elliptic Curve in Affine Coordinates. Formaliz. Math. 27(3): 315-320 (2019) - 2018
- [j25]Kazuhisa Nakasho, Yuichi Futa, Yasunari Shidama:
Continuity of Bounded Linear Operators on Normed Linear Spaces. Formaliz. Math. 26(3): 231-237 (2018) - [c4]Hiroyuki Okazaki, Yuichi Futa, Kenichi Arai:
Suitable Symbolic Models for Cryptographic Verification of Secure Protocols in ProVerif. ISITA 2018: 326-330 - 2017
- [j24]Yuichi Futa, Yasunari Shidama:
Embedded Lattice and Properties of Gram Matrix. Formaliz. Math. 25(1): 73 (2017) - [j23]Yuichi Futa, Yasunari Shidama:
Dual Lattice of ℤ-module Lattice. Formaliz. Math. 25(2): 157-169 (2017) - [j22]Yuichi Futa, Yasunari Shidama:
Isomorphism Theorem on Vector Spaces over a Ring. Formaliz. Math. 25(3): 171-178 (2017) - [j21]Kazuhisa Nakasho, Yuichi Futa, Yasunari Shidama:
Implicit Function Theorem. Part I. Formaliz. Math. 25(4): 269-281 (2017) - 2016
- [j20]Yuichi Futa, Yasunari Shidama:
Divisible ℤ-modules. Formaliz. Math. 24(1): 37-47 (2016) - [j19]Yuichi Futa, Yasunari Shidama:
Lattice of ℤ-module. Formaliz. Math. 24(1): 49-68 (2016) - [c3]Hiroyuki Okazaki, Yuichi Futa:
Formalization of Polynomially Bounded and Negligible Functions Using the Computer-Aided Proof-Checking System Mizar. FM4M/MathUI/ThEdu/DP/WIP@CIKM 2016: 117-131 - 2015
- [j18]Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama:
Matrix of ℤ-module1. Formaliz. Math. 23(1): 29-49 (2015) - [j17]Hiroyuki Okazaki, Yuichi Futa:
Polynomially Bounded Sequences and Polynomial Sequences. Formaliz. Math. 23(3): 205-213 (2015) - [j16]Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama:
Torsion Part of ℤ-module. Formaliz. Math. 23(4): 297-307 (2015) - 2014
- [j15]Kazuhisa Nakasho, Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama:
Rank of Submodule, Linear Transformations and Linearly Independent Subsets of Z-module. Formaliz. Math. 22(3): 189-198 (2014) - [j14]Kazuhisa Nakasho, Yuichi Futa, Yasunari Shidama:
Topological Properties of Real Normed Space. Formaliz. Math. 22(3): 209-223 (2014) - [j13]Yuichi Futa, Hiroyuki Okazaki, Kazuhisa Nakasho, Yasunari Shidama:
Torsion Z-module and Torsion-free Z-module. Formaliz. Math. 22(4): 277-289 (2014) - [c2]Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su:
Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock. NSS 2014: 184-197 - [i1]Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su:
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm. IACR Cryptol. ePrint Arch. 2014: 272 (2014) - 2013
- [j12]Hiroyuki Okazaki, Yuichi Futa, Yasunari Shidama:
Formal definition of probability on finite and discrete sample space for proving security of cryptographic systems using Mizar. Artif. Intell. Res. 2(4): 37-48 (2013) - [j11]Yuichi Futa, Hiroyuki Okazaki, Daichi Mizushima, Yasunari Shidama:
Gaussian Integers. Formaliz. Math. 21(2): 115-125 (2013) - [j10]Hiroyuki Okazaki, Yuichi Futa, Yasunari Shidama:
Constructing Binary Huffman Tree. Formaliz. Math. 21(2): 133-143 (2013) - [j9]Yuichi Futa, Noboru Endou, Yasunari Shidama:
Isometric Differentiable Functions on Real Normed Space. Formaliz. Math. 21(4): 249-260 (2013) - [j8]Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama:
Submodule of free Z-module. Formaliz. Math. 21(4): 273-282 (2013) - [j7]Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama:
Formalization of Definitions and Theorems Related to an Elliptic Curve Over a Finite Prime Field by Using Mizar. J. Autom. Reason. 50(2): 161-172 (2013) - 2012
- [j6]Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama:
Z-modules. Formaliz. Math. 20(1): 47-59 (2012) - [j5]Yuichi Futa, Hiroyuki Okazaki, Daichi Mizushima, Yasunari Shidama:
Operations of Points on Elliptic Curve in Projective Coordinates. Formaliz. Math. 20(1): 87-95 (2012) - [j4]Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama:
Quotient Module of Z-module. Formaliz. Math. 20(3): 205-214 (2012) - [j3]Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama:
Free ℤ-module. Formaliz. Math. 20(4): 275-280 (2012) - [c1]Yuichi Futa, Daichi Mizushima, Hiroyuki Okazaki:
Formalization of Gaussian integers, Gaussian rational numbers, and their algebraic structures with Mizar. ISITA 2012: 591-595 - 2011
- [j2]Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama:
Formalization of Integral Linear Space. Formaliz. Math. 19(1): 61-64 (2011) - [j1]Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama:
Set of Points on Elliptic Curve in Projective Coordinates. Formaliz. Math. 19(3): 131-138 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint